Abstract
In this study, we consider a security efficiency maximization problem in a multiple unmanned aerial vehicle (UAV)-aided system with mobile edge computing (MEC). Two kinds of UAVs, including multiple computing UAVs (CUAVs) and multiple jamming UAVs (JUAVs), are considered in this system. CUAVs would receive partial computation bits and send the computation results to ground users. JUAVs do not undertake computing tasks and only send interference signals to counter potential ground eavesdroppers. We jointly optimize the ground user scheduling, UAV power, and UAV trajectory to maximize the security efficiency. The original problem is non-convex and difficult to solve. We first use the Dinkelbach method combined with continuous convex approximation technology, and then propose three corresponding subproblems, including user scheduling subproblem, UAV power subproblem, and UAV trajectory problem. Further, we apply the branch and bound method to solve the user scheduling subproblem, and optimize the two remaining subproblems by introducing auxiliary variables and Taylor expansion. The simulation results show that the proposed scheme can obtain better secure off-loading efficiency with respect to the existing schemes.
1 Introduction
The application of 5G mobile communication technology has brought many conveniences to people’s life and production activities. The 5G network meets the needs of users for high bandwidth, low latency, and a large number of connected services. MEC is an important application in the 5G era. MEC provides local off-loading, which can effectively alleviate the data transmission pressure of the core network. In addition, mobile edge computing has flexible routing, efficient computing and storage capabilities, and can solve the key challenges of realizing the 5G vision (Pham et al., 2020). In many emerging applications, the demand for MEC is mainly reflected in the three aspects of delay, bandwidth, and security (Zhang et al., 2019). For instance, due to the limited battery capacity and energy consumption of mobile devices, MEC brings storage and computing resources to the edge of the network, enabling programs to run on mobile devices and meet latency requirements (Mach and Becvar, 2017). MEC-enabled loV can meet its heterogeneous needs for communication, computing, and storage, and to minimize the energy consumption of RSU (Ning et al., 2019). MEC cooperates with cloud computing to off-load the computing tasks in the vehicle network to the car, which can effectively reduce computing time and improve system practicability (Zhao et al., 2019). With the emergence of 5G, the industrial Internet is also developing rapidly. Data cleaning based on mobile edge nodes can maintain the reliability and integrity of data while improving the efficiency of data cleaning and reducing the energy consumption of industrial sensor cloud systems (Wang et al., 2020). In order to solve the problem of limited battery lifetime and low computing power of wireless devices, Mozaffari et al. (2019) proposed an MEC system supported by wireless power transfer to enhance computational capability. In the study by Han et al. (2020), the authors proposed a new algorithm to measure the efficiency of mobile edge computing systems. The maximum efficiency of MEC can be jointly optimized by the unloading time, CPU frequency, transmit power of users, and UAV trajectory (Bi and Zhang, 2018). Ding et al. (2019) studied the energy-saving resource allocation of MEC networks using NOMA.
MEC applications are deployed on general-purpose servers and are close to users, so UAVs are used to assist mobile edge computing. UAV-assisted MEC expands the coverage area of edge computing and improves computing capabilities. Due to the high mobility and flexibility of UAVs (Zeng and Zhang, 2017), UAV communication technology is widely used in many fields of electronic design, leading to rapid development of wireless communication technology (Gupta et al., 2016; Wu et al., 2018). Among them, Wu et al. (2018) considered a multi-UAV–enabled wireless communication system to provide services for ground users. UAVs can quickly cover the target area and divert services, which have a wide range of application scenarios (Sebastian and Jochen, 2014; Nader et al., 2018). For example, in smart cities, UAVs can be used for traffic management, environmental monitoring, pollution monitoring, and civil defense control (Hua et al., 2018). The use of drone aerial survey technology can effectively improve the efficiency and accuracy of topographic surveying and mapping work (Roberge et al., 2013). In the military field, UAVs can plan routes. Specifically, UAVs can plan a safe path in an obstacle environment according to their environment and maneuverability (Cao et al., 2018). When mobile edge computing is used to off-load computing tasks to UAVs, the off-loaded information may be destroyed by eavesdroppers. With the increasing demand for global cellular network coverage, UAVs combined with cellular networks can support UAV communications in a low-cost and highly maneuverable manner (Wu et al., 2018). As an aerial base station, UAVs help the ground macro base station to provide high-rate data coverage when there are multiple or large service demands in the target area (Sun et al., 2019). In the cellular-connected UAV mobile edge computing system, parts of the tasks are migrated to the terrestrial base station for calculation, and the other part is calculated on the UAV (Hua et al., 2018). When the cellular system is attacked by jamming, the UAV can select a relay strategy for the mobile users in the cellular system (Lu et al., 2020).
In order to improve traffic efficiency, the UAV-assisted MEC system with three-layer integrated architecture is used to solve the dynamic optimization problem of energy perception (Zhang et al., 2018). UAV-assisted MEC systems need to meet the requirements of low energy consumption and high computing bits (Loke, 2015; Zhou Z. et al., 2018). In the study by Zhou F. et al. (2018), the problem of maximizing computational efficiency is studied by jointly optimizing the computational shunt and the UAV trajectory design in the UAV-assisted MEC network. The problem of maximizing the unloading efficiency of the multi-UAV–assisted MEC system is studied.
The study considers the calculation of bits and energy consumption (Zhang et al., 2020). In order to expand the coverage of edge computing, multiple UAVs can be used to assist MEC systems (Narang et al., 2017). But UAV-assisted MEC systems are at risk of eavesdropping. Zhao et al. (2019) proposed an energy-saving computing off-loading technology focusing on physical layer security. UAVs are used to send jamming signals to combat against eavesdroppers and improve the transmission security rate (Li et al., 2019).
The rest of the article is organized as follows: Section 2 introduces the multiple UAV group–assisted MEC system and formulates the joint optimization problem. In Section 3, the optimal solution is proposed, while Section 4 details numerical simulations. Finally, Section 5 provides concluding remarks.
2 The System Model and Problem Formulation
2.1 The System Model
As shown in Figure 1, we consider a multiple UAV group–assisted MEC system, which includes jamming UAVs, UAVs, K eavesdroppers, and M legal smart mobile devices. A multiple UAV group has enormous computing ability, and its task is to fly from the initial position to the final position specified on the ground . Legitimate smart mobile devices can receive data from outside. Due to the limited computing performance of ground mobile devices, some data are off-loaded to UAV via wireless links for auxiliary calculations. But there will be eavesdroppers monitoring the eavesdropping data. For the security of data transmission, the jamming UAVs are added and the jamming data are sent to eavesdroppers, and the system operates within a certain flight period T. For ease of explanation, the flight period is divided into N slots with the same slot length. The slot length is small enough to allow the UAVs to fly at a small distance and approximate the channel gain within each slot.
FIGURE 1
Taking into account the 3-D Cartesian coordinate system, every legitimate device and the eavesdropper K scattered on the ground irregularly, and their horizontal coordinates are given by . Assume that all JUAVs are flying at a constant altitude above the ground, while UAVs are flying at a constant altitude above the ground.
The flight path of the slot projected by on the horizontal plane can be expressed as . The flight path of slot n projected by on the horizontal plane can be expressed as .
Therefore, we can obtain the distance between UAVs and any ground equipment at a time slot according to the Euclidean formula, as follows:
In general, for UAV-SMD wireless communication links, line-of-sight channels are more dominant than other channels. Similar to Hu et al. (2019) and Jeong et al. (2018), we consider that the wireless channel between ground equipment and UAV is a free space path loss model, which can be expressed as follows:where is the channel power gain at the reference distance .
The channel from the legal device to the listener can be modeled as follows:where φ is the path loss index, ξ is a random variable with exponential distribution, and its unit average represents small-scale Rayleigh fading.
For each legal device, its data can be calculated locally or its data can be off-loaded to the UAV for calculation. A binary variable is introduced to distinguish different states. The binary variable indicates that the UAV provides services for SMD in the time slot n and the two are associated, or it is 0.
2.1.1 Security Rate
Here, a UAV can serve up to one legitimate user:
Under the above conditions, the data transmission rate that the user can reach can be expressed aswherewhere represents the power of the additive Gaussian white noise.
Similarly, the achievable rate of the kth eavesdropper eavesdropping on user m in time slots is given bywhere
Therefore, in the case of k eavesdropper in the horizon time T, the worst-case security rate of the user is given by Zhu et al. (2017) and Zhu et al. (2016):
So the total expression isin which is the variable set of user association, system power, and trajectory of UAVs, that is, .
2.1.2 System Energy
The total energy consumption of the system consists of five parts: UAV transmission and unloading energy, UAV propulsion energy, ground equipment calculation energy, UAV calculation energy, and JUAV interference energy. According to Zeng and Zhang (2017), the propulsion energy of the UAV is much higher than other orders of magnitude, so only the propulsion energy of the UAV is calculated. The flight energy consumption of UAVs can be expressed aswhere g represents the acceleration of gravity, represents the wing area and air density constant of the UAV, and represents the weight-dependent constant of the UAV.
As a result, the total expression is expressed as
According to Sun et al. (2019), the computational efficiency is considered to be the ratio of the total calculation bit to the total energy consumption, as given below:
2.2 Problem Formulation
This study focuses on maximizing the off-loading efficiency of multi-UAV–assisted edge computing, which jointly optimizes user resource scheduling, UAV flight power, andUAV trajectory. Based on the above analysis, the problem in this study can be expressed as
3 Proposed Solution
In this section, the computational efficiency maximization problem is solved by the iterative optimization algorithm. Since problem P is a nonlinear fractional problem, in order to make the problem easier to deal with, the Dinkelbach method is used to eliminate the fractional structure. Considering the coupling of user association, resource allocation, and trajectory scheduling, we decompose the original problem into three subproblems and propose an iterative optimization algorithm to solve it.
3.1 Dinkelbach-Based Problem Reconstruction and Solution
With the application of the Dinkelbach method P, solving a fractional programming problem transforms the original problem into a parameter programming problem on the basis of the of the same constraint conditions. We introduce a parameter η to represent the computational efficiency according to Dinkelbach (1967).
Assuming that is the optimal computational efficiency, the following Lemma can define the necessary and sufficient conditions for the optimal solution.
Lemma 1: the optimal solution can be obtained if and only if
Proof: please refer to Dinkelbach (1967).
Problem p can be transformed into a parameter problem , according to Lemma 1, given as follows:where η is a nonnegative parameter. We then define the following equation:which is a strictly monotonic decreasing function for η (Li et al., 2019). If the optimal has been given in advance, we have for ; otherwise, we obtain for .
To obtain the optimal computational efficiency, a set of increments η is obtained by the Dinkelbach method, and the value of is approximately 0 by multiple iterations. The given η can be obtained by studying in problem . Based on the correct , we then get the value of the new η. After several iterations, the optimal and can be determined until is satisfied.
3.2 Joint Optimization
Although problem has been relatively easy to handle, it is still non-convex due to the coupling between the variables of the UAV trajectory, user resource scheduling, and UAV power and spectrum resources. For decoupling non-convex problems, we decompose the problem into different subproblems and propose an iterative algorithm to solve them alternately.
3.2.1 User Association Optimization
We first propose the following definition:in which
According to the previous results, we formulate the following alternative problem:
Equation 21 is a convex problem, which can be solved by the existing toolbox, such as CVX. We then focus on the resource allocation optimization.
3.2.2 Resource Allocation Optimization
In the case of given UAV user association and a flight trajectory, the power optimization of P1 in the problem can be changed into a new problem SP2 as follows.
It can be noticed that power p contains the UAV power pm and the jamming UAV power . The whole function is a non-convex function, and the two powers need to be discussed separately and transformed into convex functions.
It can be seen from the original formula of SP2 that . We then define a function as follows:where is a fraction, which can be transformed via the Dinkelbach method. Thus, we obtain the following version:
As a result, we transform the original problem p as follows:whose gradient can be expressed as follows:
We then carry out the first-order Taylor expansion of as follows:
Combining Eqs. 27, 28, we get the following problem:
Similarly, we transform the constraint as a convex form and obtain
Further, we carry out the first-order Taylor expansion of and transform it into the form of . Finally, can be optimized to the following form:
The convex transformation of UAV power is discussed as above, and the following is the same for interfering with UAV power .
We get the definition as , , , and . Then, the original problem is transformed intowhich can be expressed as
It can be seen that the original formula is not simple enough, so it should be further optimized. We assume , , , and . Then the function is transformed into
We similarly utilize the Dinkelbach method for the formula to optimize the fraction into an integral:whose gradient can be expressed as
According to the expression of , we transform into a new problem as follows:
3.2.3 Trajectory Scheduling of UAVs
Finally, we can optimize the trajectory scheduling of UAVs at a given user association and given power and frequency. The total SMD energy consumption for processing computing tasks is as follows:where the relaxation variable is used to replace the variable satisfyingwhich can be transformed into
It is worth noting that optimizing the original formula, we get the following formula:
In this way, the original problem becomes a convex expression as in Eq. 42, which can be solved by CVX.
4 Numerical Results
In this section, we provide a visual representation of our proposed scheme and comparison scheme. Since the space-to-ground channel is a LoS channel, we further assume that the ground signal obeys Rayleigh fading. We use MATLAB to generate artificial data, and in each setting, 1,000 experiments are used to take the average of the results. Specific parameter setting is provided in Table 1.
TABLE 1
| Parameter | Symbol | Value |
|---|---|---|
| The total system bandwidth | B | 30 MHz |
| The total task completion time | T | 100 s |
| Number of time slots | N | 50 |
| The channel power gain at a reference distance of m | −30 dB | |
| The noise power | −60 dB | |
| The fixed altitude of the UAV | 100 m | |
| The maximum available speed of the UAV | 10 m/s | |
| The initial and final position of the UAV | (0,0), (200,0) | |
| The position of the ground users | (50,75), (150,75) | |
| The position of the eavesdroppers | (0,75), (200,75) | |
| The effective switched capacitance of the UAV | κ | |
| Required CPU cycles per bit | 1,000 cycles/bit | |
| Task input data size | 200 Kbits |
Simulation parameters.
Figure 2 shows the UAVs’ flight trajectory and the location of the ground user. The red discrete points represent the flight trajectory of the interference UAV, and the black discrete points represent the flight trajectory of the UAV. The blue dots represent ground users, and the green dots represent eavesdroppers. It can be seen from the figure that the flying speed of the drone will slow down when it is close to the user, and the flying speed will increase when it is far away from the user.
FIGURE 2
Figure 3 represents how energy efficiency varies with the number of calculated bits. We have provided the results of four schemes for comparison: 1) the scheme proposed in this article, 2) the scheme without JUAV, 3) the case without eavesdroppers, and 4) the scheme with ground jammers. According to Figure 3, as the number of calculation bits increases, the energy efficiency gradually decreases. Furthermore, our proposed scheme has better performance than other benchmark schemes.
FIGURE 3
In Figure 4, it shows the variation of energy consumption with the number of bits. Since our proposed scheme is to maximize energy efficiency rather than minimizing energy consumption, we must consider whether the actual energy consumed is reasonable. The results in Figure 4 show that the proposed scheme still has better performance in terms of energy consumption.
FIGURE 4
In Figure 5, we show the energy efficiency curve with the maximum power on the drone. It is worth noting that as the maximum power of the UAV increases, the energy efficiency also increases. This is because when the energy is severely limited, the function of interfering with the eavesdropper and the auxiliary communication can seriously damage the safe rate. The greater the power of the UAVs, the less the impact of eavesdroppers.
FIGURE 5
5 Conclusion and Discussion
In this article, we propose a multi-UAVs–assisted mobile edge computing system in which different multi-UAVs undertake computing tasks and interference tasks, respectively. We propose an alternate optimization algorithm and transform different subproblems into convex problems for easy solution. The simulation results prove the superiority of our proposed scheme.
It is worth noting that we assume that both the air-to-ground channel and the terrestrial channel are perfectly known. However, in practical applications, the channel from the user to the potential eavesdropper is usually imperfect. In this case, how to enhance the robustness of the system is the direction of our follow-up work.
Statements
Data availability statement
The original contributions presented in the study are included in the article/Supplementary Material; further inquiries can be directed to the corresponding author.
Funding
This work was supported in part by the key scientific and technological project of Henan Province, Grant 212102210558.
Conflict of interest
The author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Author Contribution
GM finished this paper independently, including the conception of the study, analysis and manuscript preparation, manuscript writing, and the experiment.
References
1
BiS.ZhangY. J. (2018). Computation Rate Maximization for Wireless Powered mobile-edge Computing with Binary Computation Offloading. IEEE Trans. Wireless Commun.17, 4177–4190. 10.1109/TWC.2018.2821664
2
CaoX.XuJ.ZhangR. (2018). “Mobile Edge Computing for Cellular-Connected Uav: Computation Offloading and Trajectory Optimization,” in 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 1–5. 10.1109/SPAWC.2018.8445936
3
DingZ.FanP.PoorH. V. (2019). Impact of Non-orthogonal Multiple Access on the Offloading of mobile Edge Computing. IEEE Trans. Commun.67, 375–390. 10.1109/TCOMM.2018.2870894
4
DinkelbachW. (1967). On Nonlinear Fractional Programming. Management Sci.13. 10.1287/mnsc.13.7.492
5
GuptaL.JainR.VaszkunG. (2016). Survey of Important Issues in Uav Communication Networks. IEEE Commun. Surv. Tutorials18, 1123–1152. 10.1109/COMST.2015.2495297
6
HanQ.ZhengG.XuC. (2020). “Energy-efficient Resource Allocation for mobile Edge Computing in Noma-Enabled Small Cell Networks,” in 2020 IEEE 20th International Conference on Communication Technology (ICCT), 415–419. 10.1109/ICCT50939.2020.9295762
7
HuQ.CaiY.YuG.QinZ.ZhaoM.LiG. Y. (2019). Joint Offloading and Trajectory Design for Uav-Enabled mobile Edge Computing Systems. IEEE Internet Things J.6, 1879–1892. 10.1109/JIOT.2018.2878876
8
HuaM.HuangY.WangY.WuQ.DaiH.YangL. (2018). Energy Optimization for Cellular-Connected Multi-Uav mobile Edge Computing Systems with Multi-Access Schemes. J. Commun. Inf. Networks3 (4), 33–44. 10.1109/iccs.2018.8689226
9
JeongS.SimeoneO.KangJ. (2018). Mobile Edge Computing via a Uav-Mounted Cloudlet: Optimization of Bit Allocation and Path Planning. IEEE Trans. Veh. Technol.67, 2049–2063. 10.1109/TVT.2017.2706308
10
LiA.WuQ.ZhangR. (2019). Uav-enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel. IEEE Wireless Commun. Lett.8, 181–184. 10.1109/LWC.2018.2865774
11
LokeS. W. (2015). The Internet of Flying-Things: Opportunities and Challenges with Airborne Fog Computing and mobile Cloud in the Clouds. Computer Sci.
12
LuX.XiaoL.DaiC.DaiH. (2020). Uav-aided Cellular Communications with Deep Reinforcement Learning against Jamming. IEEE Wireless Commun.27, 48–53. 10.1109/MWC.001.1900207
13
MachP.BecvarZ. (2017). Mobile Edge Computing: A Survey on Architecture and Computation Offloading. IEEE Commun. Surv. Tutorials19, 1628–1656. 10.1109/COMST.2017.2682318
14
MozaffariM.SaadW.BennisM.NamY.-H.DebbahM. (2019). A Tutorial on Uavs for Wireless Networks: Applications, Challenges, and Open Problems. IEEE Commun. Surv. Tutorials21, 2334–2360. 10.1109/COMST.2019.2902862
15
NaderM.JameelaA. J.ImadJ.AhmedI.FarhanM. (2018). Unmanned Aerial Vehicles Applications in Future Smart Cities. Technol. Forecast. Soc. Change153, S0040162517314968. 10.1016/j.techfore.2018.05.004
16
NarangM.XiangS.LiuW.GutierrezJ.ChiaraviglioL.SathiaseelanA.et al (2017). “Uav-assisted Edge Infrastructure for Challenged Networks,” in 2017 IEEE Conference on Computer Communications Workshops, Atlanta, GA, United States, (INFOCOM WKSHPS), 60–65. 10.1109/INFCOMW.2017.8116353
17
NingZ.HuangJ.WangX.RodriguesJ. J. P. C.GuoL. (2019). Mobile Edge Computing-Enabled Internet of Vehicles: Toward Energy-Efficient Scheduling. IEEE Netw.33, 198–205. 10.1109/MNET.2019.1800309
18
PhamQ.-V.FangF.HaV. N.PiranM. J.LeM.LeL. B.et al (2020). A Survey of Multi-Access Edge Computing in 5g and beyond: Fundamentals, Technology Integration, and State-Of-The-Art. IEEE Access8, 116974–117017. 10.1109/ACCESS.2020.3001277
19
RobergeV.TarbouchiM.LabonteG. (2013). Comparison of Parallel Genetic Algorithm and Particle Swarm Optimization for Real-Time Uav Path Planning. IEEE Trans. Ind. Inf.9, 132–141. 10.1109/TII.2012.2198665
20
SebastianS.JochenT. (2014). Mobile 3d Mapping for Surveying Earthwork Projects Using an Unmanned Aerial Vehicle (Uav) System. SciencDirect Automation in Constructin. 41, 1–14. 10.1016/j.autcon.2014.01.004
21
SunH.ZhouF.HuR. Q. (2019). Joint Offloading and Computation Energy Efficiency Maximization in a mobile Edge Computing System. IEEE Trans. Veh. Technol.68, 1. 10.1109/TVT.2019.2893094
22
WangT.KeH.ZhengX.WangK.SangaiahA. K.LiuA. (2020). Big Data Cleaning Based on mobile Edge Computing in Industrial Sensor-Cloud. IEEE Trans. Ind. Inf.16, 1321–1329. 10.1109/TII.2019.2938861
23
WuQ.ZengY.ZhangR. (2018). Joint Trajectory and Communication Design for Multi-Uav Enabled Wireless Networks. IEEE Trans. Wireless Commun.17, 2109–2121. 10.1109/TWC.2017.2789293
24
ZengY.ZhangR. (2017). Energy-efficient Uav Communication with Trajectory Optimization. IEEE Trans. Wireless Commun.16, 3747–3760. 10.1109/TWC.2017.2688328
25
ZhangJ.ZhouL.ZhouF.SeetB.-C.ZhangH.CaiZ.et al (2020). Computation-efficient Offloading and Trajectory Scheduling for Multi-Uav Assisted mobile Edge Computing. IEEE Trans. Veh. Technol.69, 2114–2125. 10.1109/TVT.2019.2960103
26
ZhangL.ZhaoZ.WuQ.ZhaoH.XuH.WuX. (2018). Energy-aware Dynamic Resource Allocation in Uav Assisted mobile Edge Computing over Social Internet of Vehicles. IEEE Access6, 56700–56715. 10.1109/ACCESS.2018.2872753
27
ZhangX.ZhongY.LiuP.ZhouF.WangY. (2019). Resource Allocation for a Uav-Enabled mobile-edge Computing System: Computation Efficiency Maximization. IEEE Access7, 113345–113354. 10.1109/ACCESS.2019.2935217
28
ZhouF.WuY.HuR. Q.QianY. (2018). Computation Rate Maximization in Uav-Enabled Wireless-Powered mobile-edge Computing Systems. IEEE J. Select. Areas Commun.36, 1927–1941. 10.1109/JSAC.2018.2864426
29
ZhouZ.FengJ.TanL.HeY.GongJ. (2018). An Air-Ground Integration Approach for mobile Edge Computing in Iot. IEEE Commun. Mag.56, 40–47. 10.1109/MCOM.2018.1701111
30
ZhaoJ.LiQ.GongY.ZhangK. (2019). Computation Offloading and Resource Allocation for Cloud Assisted mobile Edge Computing in Vehicular Networks. IEEE Trans. Veh. Technol.68, 7944–7956. 10.1109/TVT.2019.2917890
31
ZhuZ.ChuZ.WangN.HuangS.WangZ.LeeI. (2017). Beamforming and Power Splitting Designs for An-Aided Secure Multi-User Mimo Swipt Systems. IEEE Trans.Inform.Forensic Secur.12, 2861–2874. 10.1109/TIFS.2017.2721908
32
ZhuZ.ChuZ.WangZ.LeeI. (2016). Outage Constrained Robust Beamforming for Secure Broadcasting Systems with Energy Harvesting. IEEE Trans. Wireless Commun.15, 7610–7620. 10.1109/TWC.2016.2605102
Summary
Keywords
mobile edge computing, multi-UAV, computation efficiency, secure transmission, jamming, trajectory scheduling
Citation
Mu G (2021) Security Efficiency Maximization for Multi-UAV–Aided Network With Mobile Edge Computing. Front. Comput. Sci. 3:691854. doi: 10.3389/fcomp.2021.691854
Received
07 April 2021
Accepted
11 May 2021
Published
04 June 2021
Volume
3 - 2021
Edited by
Wei Wu, Nanjing University of Posts and Telecommunications, China
Reviewed by
Yi Song, Huaiyin Normal University, China
Pei Li, Nanjing University of Posts and Telecommunications, China
Hongjiang Lei, Chongqing University of Posts and Telecommunications, China
Updates
Copyright
© 2021 Mu.
This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Guangchen Mu, hngxymgc@126.com
This article was submitted to Mobile and Ubiquitous Computing, a section of the journal Frontiers in Computer Science
Disclaimer
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.